2018
DOI: 10.1109/access.2017.2779146
|View full text |Cite
|
Sign up to set email alerts
|

Security for 5G Mobile Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
140
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 234 publications
(143 citation statements)
references
References 54 publications
0
140
0
3
Order By: Relevance
“…Together with NOMA, physical layer security (PLS) has attracted more research attention. The issues of security features for 5G networks have taken on an increasingly pivotal role in the corresponding security services [28,29]. Explicit insights for understanding NOMA and PLS, the maximization of secrecy sum rate for NOMA system was analyzed in [30], where the power allocation to users is taken into consideration.…”
Section: Introductionmentioning
confidence: 99%
“…Together with NOMA, physical layer security (PLS) has attracted more research attention. The issues of security features for 5G networks have taken on an increasingly pivotal role in the corresponding security services [28,29]. Explicit insights for understanding NOMA and PLS, the maximization of secrecy sum rate for NOMA system was analyzed in [30], where the power allocation to users is taken into consideration.…”
Section: Introductionmentioning
confidence: 99%
“…This is different in 5G network which needs to support new business and trust models, new service delivery models with increased privacy concerns and an evolved threat landscape. The 5G network will therefore need to ensure and have the ability towards defending against security attacks such as Denial of Service (DoS) for critical mission applications such as smart grids, public safety, water distribution and natural gas networks [8,37] .…”
Section: Enhanced Service Availability Security and Mobilitymentioning
confidence: 99%
“…A variety of emerging new use-cases and networking paradigms demand new security requirements and considerations [58]. For example, 5G networks need to employ adaptive intrusion detection system, which can perform the following tasks: (i) detect bandwidth spoofing attack on 5G relay, small cell access point, and base station, (ii) employ UEs initial authentication at the access points, and 5G RAN by a highly secured authentication and handover mechanism with the minimal handover latency and no loss of user privacy.…”
Section: Security Challengesmentioning
confidence: 99%
“…The advent in security mechanisms is highly required to meet the overall 5G advanced features such as ultra-low latency and ultra-high energy efficiency [58]. Different to the conventional radio cellular networks, the emerging 5G wireless networks will be service-oriented, which necessitates a particular emphasis on security and privacy requirements from the perspective of service-based architecture (SBA) [58]. Hence, UK MNOs have to ensure data exchange security for network function (NF) service registration and de-registration, NF service discovery, NF service authorization and authentication in the presence of different attack vectors that may cause loss of NF availability, loss of data integrity, and attack from the insiders [70].…”
Section: Security Challengesmentioning
confidence: 99%